Conferences

Search results

    TitleConferenceSpeaker(s)
    Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade AttacksUSENIX Security '20Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu
    Interpretable Deep Learning under FireUSENIX Security '20Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang
    P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface ModelingUSENIX Security '20Bo Feng, Alejandro Mera, Long Lu
    Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheckUSENIX Security '20Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman
    McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network ServersUSENIX Security '20Daniel J. Bernstein, Tanja Lange
    Exploring Connections Between Active Learning and Model ExtractionUSENIX Security '20Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan
    KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write VulnerabilitiesUSENIX Security '20Weiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian
    HALucinator: Firmware Re-hosting Through Abstraction Layer EmulationUSENIX Security '20Abraham A Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer
    BScout: Direct Whole Patch Presence Test for Java ExecutablesUSENIX Security '20Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang
    Local Model Poisoning Attacks to Byzantine-Robust Federated LearningUSENIX Security '20Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Gong
    PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized UtilityUSENIX Security '20Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao
    Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog SanitizationUSENIX Security '20Md Mehedi Hasan, Biswajit Ray
    Security Analysis of Unified Payments Interface and Payment Apps in IndiaUSENIX Security '20Renuka Kumar, Sreesh Kishore, Hao Lu, Atul Prakash
    Stealthy Tracking of Autonomous Vehicles with Cache Side ChannelsUSENIX Security '20Mulong Luo, Andrew C. Myers, G. Edward Suh
    (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested VirtualizationUSENIX Security '20Zeyu Mi, Dingji Li, Haibo Chen, Binyu Zang, Haibing Guan
    SAVIOR: Securing Autonomous Vehicles with Robust Physical InvariantsUSENIX Security '20Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, Zhiqiang Lin
    Updates-Leak: Data Set Inference and Reconstruction Attacks in Online LearningUSENIX Security '20Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang
    Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited QueriesUSENIX Security '20Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian
    Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoTUSENIX Security '20Haohuang Wen, Qi Alfred Chen, Zhiqiang Lin
    MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability SignaturesUSENIX Security '20Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi
    Cardpliance: PCI DSS Compliance of Android ApplicationsUSENIX Security '20Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves
    High Accuracy and High Fidelity Extraction of Neural NetworksUSENIX Security '20Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot
    SpecFuzz: Bringing Spectre-type vulnerabilities to the surfaceUSENIX Security '20Oleksii Oleksenko, Bohdan Trach, Mark Silberstein, Christof Fetzer
    Datalog DisassemblyUSENIX Security '20Antonio Flores-Montoya, Eric Schulte
    PKU Pitfalls: Attacks on PKU-based Memory Isolation SystemsUSENIX Security '20R. Joseph Connor, Tyler McDaniel, Jared M. Smith, Max Schuchard

Pages